Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_32
Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li
{"title":"Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN","authors":"Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li","doi":"10.1007/978-3-030-41579-2_32","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_32","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121657891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_44
Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo
{"title":"Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities","authors":"Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo","doi":"10.1007/978-3-030-41579-2_44","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_44","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126882474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_15
Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu
{"title":"SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks","authors":"Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu","doi":"10.1007/978-3-030-41579-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_15","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126912443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_36
Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu
{"title":"Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks","authors":"Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu","doi":"10.1007/978-3-030-41579-2_36","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_36","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121950795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_24
Athmane Seghier, Jianxin Li
{"title":"Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes)","authors":"Athmane Seghier, Jianxin Li","doi":"10.1007/978-3-030-41579-2_24","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_24","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_22
Geng Wang, Z. Liu, Dawu Gu
{"title":"Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption","authors":"Geng Wang, Z. Liu, Dawu Gu","doi":"10.1007/978-3-030-41579-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_22","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_6
Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang
{"title":"Cloning Vulnerability Detection in Driver Layer of IoT Devices","authors":"Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang","doi":"10.1007/978-3-030-41579-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_6","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-3-030-41579-2_31
Matthias Marx, Monina Schwarz, M. Blochberger, Frederik Wille, H. Federrath
{"title":"Context-Aware IPv6 Address Hopping","authors":"Matthias Marx, Monina Schwarz, M. Blochberger, Frederik Wille, H. Federrath","doi":"10.1007/978-3-030-41579-2_31","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_31","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125122908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning","authors":"Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu","doi":"10.1007/978-3-030-41579-2_42","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_42","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}